indetectables-net / teorias-numeradas
Mirror de las teorias numeradas del sitio de Narvaja
☆14Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for teorias-numeradas
- Conjunto de manuales para reversa/analisis/cracking☆52Updated 2 years ago
- ☆64Updated 3 years ago
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- LD_PRELOAD rootkit☆122Updated 8 months ago
- ☆52Updated 2 years ago
- ☆33Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆38Updated 7 months ago
- Academic project of Linux rootkit made for Bachelor Engineering Thesis.☆92Updated 3 months ago
- ☆82Updated 2 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆56Updated 2 weeks ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- ☆17Updated 4 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆124Updated 11 months ago
- Native Syscalls Shellcode Injector☆262Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated last year
- Encypting the Heap while sleeping by hooking and modifying Sleep with our own sleep that encrypts the heap☆238Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 4 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆88Updated last month
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 2 years ago
- The CIA Hive source code as released by Wikileaks☆158Updated 2 years ago
- Spoofing desktop login applications with WinForms and WPF☆170Updated 9 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated last year
- simple Windows handle hijacker with a nod to Apxaey for inspiration☆201Updated last year
- APK Infrastructure Investigator☆63Updated last year
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆294Updated 4 months ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆36Updated last year
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆214Updated last year